Empirical study on features recommended by LSVC in classifying unknown Windows malware

dc.contributor.authorShiva Darshan S.L.
dc.contributor.authorJaidhar C.D.
dc.date.accessioned2020-03-31T14:15:22Z
dc.date.available2020-03-31T14:15:22Z
dc.date.issued2019
dc.description.abstractModern malware has greatly evolved and become sophisticated with the capability to evade existing detection techniques. To defend against an advanced class of malware, behaviour-based malware detection technique has emerged as an essential complement. The major challenging task in this technique is to identify significant features from the original features’ set. The main objective of this work was to explore the effectiveness of the linear support vector classification (LSVC) in choosing prominent features from an original feature set derived from the Cuckoo sandbox generated behaviour reports. In this work, the proposed malware detection system (MDS) utilizes the Cuckoo sandbox to obtain runtime behaviour report of the Windows executable file to be examined. From the report, features are extracted, and then LSVC is applied onto the extracted features to recognize crucial features, which boost the detection ability of the MDS. The efficiency of the proposed MDS was evaluated using real-world malware samples with tenfold cross-validation tests. The experimental results demonstrated that the proposed MDS is proficient in accurately detecting malware and benign executable files by attaining a detection accuracy of 98.429% with the sequential minimal optimization (SMO) classifier. © Springer Nature Singapore Pte Ltd. 2019en_US
dc.identifier.citationAdvances in Intelligent Systems and Computing, 2019, Vol.817, pp.577-590en_US
dc.identifier.uri10.1007/978-981-13-1595-4_46
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/13792
dc.titleEmpirical study on features recommended by LSVC in classifying unknown Windows malwareen_US
dc.typeBook Chapteren_US

Files

Collections